The ability to scope out a Ethical Hacking Assessment at Silicon Valley Scale

Building out Finding Reports and designing them for the right audience

Being able to speak to Executives and Leadership at large organizations

Passive and Active Reconnaissance tools and Techniques

Real World Up to Date Exploitation Techniques

Post Exploitation Techniques

Custom Fix of Public Exploit Code

The ability to creatively deploy persistence and backdoor binaries

Living of the Land and Moving Laterally across the network

Password Cracking

Full Guide on Job Hunting in Silicon Valley

Requirements

Basic I.T Knowledge

Any Machine with at least 4GB of Memory (RAM)

No Prior Security or Ethical Hacking Skills

Description

Welcome to the FIRST complete guide to Ethical Hacking! A lot of other Ethical Hacking or Security courses will just teach you how to hack or attack target systems. Learning just this aspect of Ethical Hacking WILL NOT GET YOU THE JOB IN THE REAL WORLD! The RedTeam Blueprint was designed and developed by Silicon Valley Hackers to actually land you the hacking job or penetration testing!

The reason the course was designed in this unique way is due to the real world Ethical Hacking Experience at Silicon Valley Company's by Brandon Dennis. With countless years of hiring Ethical Hackers, building out Security/Ethical Hacking Teams and developing new attack techniques Brandon is uniquely qualified to provide a full top to bottom course on what it REALLY takes to get into the field of Ethical Hacking.

After completing this course you will have not only a solid understanding of Ethical Hacking but also how Teams work at Enterprise Scale, working with Executives and smashing the Interview. This course has 8+ hours of hands on training as well as a realistically usable portfolio you can bring to job interviews.

Information Security is an ever growing field and with new jobs opening everyday but not enough professionals to fill them is creating a massive demand. With the RedTeam Blueprint you will be able to fill this gap! As a RedTeam Nation Student you will have the skills required to not only go into Ethical Hacking but into any field of Information Security available!

We teach not only the ethical hacking skills required but also the other 50%! Below are just some of the subjects you will learn.

Building out a Red Team at Enterprise Silicon Valley Scale

Skills to manage the Red Team as well as internal programs that can chance how the organization works

Networking

Windows Operating System

Linux Operating System

Operating System Internals (Memory, Stack, Heap, Kernels)

Programming (Assembly & Python)

Passive & Active Reconnaissance

Attack and Create Active Directory Infrastructure

Custom Exploitation

Post Exploitation

Breaking Jail Shells

Abusing a Compromise to Lead to large scale attacks

Password Cracking

Build out a sophisticated in home lab

Building a Personal Security Brand

Building a Portfolio

Job Hunting the Silicon Valley Way

Smashing the Job Interview

These are only SOME of the topics covered in this course. Of course you will receive 24 hour support via Q/A of the course as well as access to our Private Student Only Facebook Group with access to the instructors.

Don't wait! Take your career to the next level with the RedTeam Blueprint.

Students will learn how to build out an internal Red Team at scale. Along with this a current and industry used Penetration Methodology that will outline the rest of the course.

Module Overview - Penetration Testing Process

03:39

You will learn a new industry Penetration Testing Methodology used at Silicon Valley Companies.

Penetration Testing Methodology

08:11

You will learn what Metrics are, how they are used and how to build them yourself!

Metrics & Why They Are Important

12:05

You will have a solid understanding of what assessments are in a Red Team and start brain storming on different types.

Routine Assessments Part 1 - What Are Routine Assessments?

04:25

Now that we have covered what assessments are you will learn how and why Yearly assessments are done.

Routine Assessments Part 2 - Yearly Assessments

05:28

Now that we have covered what Yearly assessments are you will learn how and why Quarterly assessments are done.

Routine Assessments Part 3 - Quarterly Assessments?

09:17

Now that we have covered what Quarterly assessments are you will learn how and why Monthly assessments are done.

Routine Assessments Part 4- Monthly Assessments?

04:31

Now that we have covered what Monthly assessments are you will learn how and why Constant assessments are done.

Routine Assessments Part 5 - Constant Assessments?

08:12

With a good understanding of the different types of assessments that are possible and their frequency I now task you with building your own for a Red Team! You will learn in this video how to build out your own.

Routine Assessments Part 6 - Building an Assessment Plan

07:21

Working with a budget and being able to build one speaks volumes about you as a professional. This is a key component to truly landing the job.

Building & Working with an Enterprise Budget

12:15

It's important to understand your specialty in the field of Ethical Hacking. This will help with job hunting as well as the interview process.

Specialties?!

03:58

The CIA Triangle is commonly used in a large section of I.T. For Security it is paramount to understand why it is in place and what each step means.

Learn how to build a virtualization environment that will be utilized throughout the rest of the course.

Installing & Using VirtualBox for Lab Virtualization

10:41

Knowing your way around Windows is required for an attacker. A lot of enterprise companies still utilize Windows environments.

Windows at a Glance

22:20

You will learn how the current Windows File System works and some intimate details about it.

The Windows File System

11:42

Knowing where and how Windows logs it's events is a core skill to any Ethical Hacker.

Windows Logs

10:50

User Account Control or UAC is going to get in your way as an Ethical Hacker. You need to get a good grasp on this topic and how its implemented to understand how to beat it!

Windows Internals - UAC

08:38

Learning to abuse Windows? Permissions is where its at. This is by far the most commonly misconfigured element of Windows environments!

Windows Internals - Permissions

16:45

Alternate Data Streams or ADS is a great way to hide data but also can be used in some sneaky and creative ways.

Windows Internals - Alternate Data Streams

08:44

API Calls in Windows can be complicated at first but once you understand what they do and how things get much easier. When looking at Windows based Privilege Escalation exploits you tend to see API Calls used and it makes reading and understanding them far easier!

Windows Internals - API Calls

12:35

The SID for Windows is a unique number for users/groups. Being able to quickly identify a user based on it's SID allows you to see a lower level of Windows.

Windows Internals - The SID

06:11

Windows Tokens are one of my favorite concepts. You can abuse these in SO MANY ways. Token Impersonation is a key concept for any Ethical Hacker!

Windows Internals - Tokens

07:49

Windows Named Pipes are used by most applications in Windows. They have their own vulnerabilities and understand what they are and how they work can allow someone to be very "creative".

Windows Internals - Named Pipes

06:01

Here we take a look and how a PE and DLL file is structured and some of the components of each. This forms a base for knowledge to be gained in future modules.

Windows Internals - PE Files & DLLs

16:08

Learning the Windows Command Line is a required skill for any hacker. You won't find yourself with a GUI very often and knowing how to move around, manage the machine and do what you need to without it is a hard requirement!

Windows Command Line - Accessing the Command Line

04:56

Learn about navigation in the Windows Command Line world!

Windows Command Line - Navigation

07:04

Learn to work with files and directories in Windows Command Line.

Windows Command Line - Working with Files and Directories

07:31

As we learned about Named Pipes now we can use them in actions to see what we can do with them.

Windows Command Line - Working with Pipes

09:32

The Standard Input Output an Error are used throughout all Operating Systems. They are commonly used the same way in most OS's. This is a useful skill to make working on the Command Line far easier.

Windows Command Line - Standard I/O/E

03:56

You never know when you need to make a configuration setting, add a rouge service or learn more about the system. Know how to manage Windows without the GUI!

Before we dive into Linux its important to understand how the file system in laid out and that EVERYTHING is a FILE!

The Linux File System

05:39

Since most of your time as an attacker is spent in a Terminal or Command Line its paramount to know how to navigate. This is fairly similar to Windows.

Linux Command Line - Navigation

04:27

Since everything is a file, that includes directories, we need to know how to work with them!

Linux Command Line - Working with Files and Directories

08:42

Very similar to Windows Standard I/O/E we will do a quick recap on the subject in Linux.

Linux Command Line - Standard I/O/E Recap

03:48

How that we understand how to work with files we need to learn how to work with data itself. We go over how to manipulate data to our will!

Linux Command Line - Working with Data

13:32

Same with Windows Permission we must learn the Linux side of the fence. There are a lot of vulnerabilities that rely on configuration issues with permissions. Understanding this will provide you a greater insight on how things work and how they can be abused.

Linux Command Line - Working with File Permissions

09:39

Man pages are the Linux Users quick look up replacement of Google Searching. These can provide very critical bits of information that are specific to a system without looking through countless white papers.

Linux Command Line - Man Pages

03:39

Being able to use and manipulate base64 is useful for not only encoding larger normally unreadable data but for getting binaries/data on and off machines!

Linux Command Line - Base64

02:56

Very similar to base64 use cases but has its uses elsewhere in other applications! Its important to understand how to quickly get and resolve hex/base64 data.

Linux Command Line - Hex

06:26

We quickly recap how to grab network connections in Linux as we did with Windows. Remember in Linux everything is a file!

Linux Command Line - Network Connections Recap

03:58

Learn about how Linux processes work and the types you will run into.

Linux Processes

13:00

INodes are an integral part of the Linux File System. They can be used in a lot of useful ways!

What are INodes?

04:30

Since everything is a file dealing with Open Files is just as important! You will learn how to manage Open Files on Linux.

Working with Open Files

06:38

Abusing Symbolic Links is very fun but you need to know how to use them first!

Symbolic Links

05:49

Linux uses ID's just like Windows uses SID's. You will need to understand these as well when attacking a Linux Machine.

The ID's

02:58

Similar to Windows Pipes Linux has their own! These are very useful for working with data.

Linux Pipes

03:19

We go over the Run Levels of Linux and what each of them mean. They each have their own attack vector.

Linux Run Levels

03:49

Logging is a big topic on Linux machines. A lot of organizations will build their own logs and sometimes provide juicy information!